Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Network Engineer
Options:
A) Modem
B) Protocols
C) Gateway
D) Multiplexer
Options:
A) 0.099
B) 0.009
C) 0.991
D) 0.999
Options:
A) Router
B) Bridge
C) Repeater
D) Switch
Options:
A) Router
B) ASA
C) Head-end device
D) Software client
Options:
A) bits
B) frames
C) packets
D) none of the options
Options:
A) Slower data transmission
B) higher error rate
C) interference of transmissions from different computers
D) All of the options
Options:
A) allows gateways to send error a control messages to other gateways or hosts
B) provides communication between the Internet Protocol Software on one machine and the
Internet Protocol Software on another
C) reports error conditions to the original source, the source must relate errors to individual
application programs and take action to correct the problem
D) All of the options
Options:
A) Modem
B) Cable
C) Hub
D) Router
Options:
A) routing
B) inter-networking
C) congestion control
D) none of the options
Options:
A) cannot talk at once
B) can receive and send data simultaneously
C) can send or receive data one at a time
D) can do one way data transmission only
Options:
A) Routing Information Protocol
B) Route Internet Protocol
C) Router Information Protocol
D) Route Intranet Protocol
Options:
A) Bridged Gateway Protocol
B) Border Gateway Protocol
C) Bridge Gateway Protocol
D) Border Gone Protocol
Options:
A) Wireless LAN
B) Wired LAN
C) Bluetooth technology
D) Wi-MAX
Options:
A) Aloha
B) Repeaters
C) Bridge
D) Switch
Options:
A) Carrier Sense Multiple Access
B) Carrier Switch Multiple Access
C) Carrier Switch Medium Access
D) Control Sense Multiple Access.
Options:
A) One or more conductors that serve as a common connection for a related group of devices
B) a continuous frequency capable of being modulated or impressed with a second signal
C) the condition when two or more stations attempt to use the same channel at the same time
D) a collection of interconnected functional units that provides a data communications service
among stations attached to the network
Options:
A) 100 photons
B) 200 photons
C) 300 photons
D) 400 photons
Options:
A) the method of determining which device has access to the transmission medium at any time.
B) a medium access control technique for multiple access transmission media
C) a form of TDMA in which circuit switching is used to dynamically change the channel
assignments
D) All of the options
Options:
A) On the network
B) Down through the layers of the IP architecture and then up the layers again
C) Across the wire
D) through the loopback dongle
Options:
A) FTP
B) SNMP
C) RPC
D) none of the options
Options:
A) Hub
B) bridge
C) gateway
D) repeater
Options:
A) UDP
B) VMTP
C) X.25
D) SMTP
Options:
A) telegraph line
B) simplex lines
C) mixedband channel
D) All of the options
Options:
A) 192
B) 192.168.10
C) 0.0.0.5
D) 51
Options:
A) UDP
B) TCP
C) FTP
D) SMTP
Options:
A) 127.0.0.1
B) 255.0.0.0
C) 255.255.0.0
D) 255.255.255.0
Options:
A) Network
B) Application
C) Data link
D) Session
Options:
A) 99
B) 80
C) 443
D) 400
Options:
A) twisted-pair wire
B) coaxial cable
C) fiber-optic cable
D) Copper cable
Options:
A) 3 Kbps
B) 6 Kbps
C) 12 Kbps
D) 24 Kbps.
Options:
A) One or devices more conductors that serve as a common connection for a related group of
B) a continuous frequency capable of being modulated or impressed with a second signal
C) the condition when two or more sections attempt to use the same channel at the same time
D) that provides a data stations attached to the network
Options:
A) TCP/IP
B) Protocol
C) Open system
D) Internet work processor
Options:
A) WINS Server
B) WINS Proxy
C) DHCP Server
D) PDC
Options:
A) equal to the remainder at the sender
B) Zero
C) Nonzero
D) the quotient at the sender
Options:
A) the subdivision of information into individually addressed packets in conjunction with
alternative routing arrangement enabled the transmission path to be altered in the event of
congestion or individual link failure
B) the employment of additional intelligence within the network enabled more sophisticated error
control and link control procedures to be applied
C) by employing wide bandwidth circuits for the trunk networks substantial economies through
extensive sharing of capacity could be achieved.
D) All of the options
Options:
A) Station address
B) IP address
C) Port address
D) Checksum
Options:
A) a user computer system
B) a processor in a large-scale computer that executes operating system instructions
C) a minicomputer that relieves main-frame computers at a computer centre of communications
control functions
D) None of the options
Options:
A) 7 slots
B) 5 slots
C) 10 slots
D) 14 slots
Options:
A) Application
B) Presentation
C) Session
D) Transport
Options:
A) DNS
B) FTP
C) NFS
D) Telnet
Options:
A) Message
B) Segment
C) Datagram
D) Frame
Options:
A) Packet Internet Groper.
B) Protocol Internet Groper
C) Packet Intranet Gateway
D) Protocol Internet Gateway
Options:
A) Application
B) Presentation
C) Session
D) All of the options
Options:
A) File Server
B) Router
C) Printer Server
D) Gateway
Options:
A) The primary ring
B) The Secondary ring
C) Both Primary Rings & Secondary Ring
D) Neither Primary Ring NOR Secondary Ring
Options:
A) To secure the WLAN
B) To manage the WLAN settings
C) To identify the WLAN
D) To configure the WLAN AP
Options:
A) Mesh
B) Star
C) Bus
D) Ring
Options:
A) Data, segment, packet, frame, bits
B) Data, frame, packet, segment, bits
C) Bits, data, packet, frame
D) Bits, frame, data, packet
Options:
A) Exposed metal parts
B) The monitor
C) The mouse
D) The network connection
Options:
A) Latency
B) Dispersion
C) collision
D) Obstruction
Options:
A) Network segment
B) Collision segment
C) Network domain
D) Collision domain
Options:
A) An inverted cable
B) A console cable
C) A cross connect cable
D) A patch cable
Options:
A) The result of having non OSI compliant protocols on the network
B) The effect when two nodes have the same MAC address
C) The result of two nodes transmitting at the same time
D) The effects of having too many repeaters in a network
Options:
A) 440
B) 80
C) 90
D) 21
Options:
A) MAC address
B) IP address
C) Both MAC address & IP address
D) None of the options
Options:
A) ABCD
B) ADE3
C) 6DE0
D) 5DE0
Options:
A) 26203
B) 16204
C) 16203
D) 12345
Q 61.
a frame is a _________
Options:
A) layer 2 PDU
B) layer 3 PDU
C) an encapsulated packet
D) both layer 2 PDU and an encapsulated packet
Options:
A) Data transfer rates of 4 mbps or 16 mbps
B) can physically use a star topology
C) can only be implemented with fiber
D) both Data transfer rates of 4 mbps or 16 mbps and can physically use a star topology
Options:
A) token ring is deterministic
B) token ring networks do not face problems with collisions
C) neither "token ring is deterministic" nor "token ring networks do not face problems with
collisions"
D) both "token ring is deterministic" and "token ring networks do not face problems with
collisions"
Options:
A) of its dual ring design
B) it is a CSMA/CD network
C) stations are guaranteed their turn to transmit
D) both of its dual ring design and it is a CSMA/CD network
Options:
A) inter mode
B) intra mode
C) multi mode
D) single mode
Options:
A) 10Base-T uses cat5 cable and transmits at 10 Mbps
B) 100Base-Fx is multi-mode fiber that transmits at 10 Mbps
C) both 10Base-T uses cat5 cable and transmits at 10 Mbps and 100Base-Fx is multi-mode fiber
that transmits at 10 Mbps are correct
D) none of the options
Options:
A) on the first floor
B) next to the POP.
C) on one of the middle floors
D) in the basement
Options:
A) token ring cabling.
B) backbone cabling.
C) coaxial cabling
D) horizontal cabling.
Options:
A) Multipurpose Internet Mail Extension
B) Multimedia Intranet Mail Extension
C) Multipurpose Intranet Mail Extension
D) Multimedia Internet Mail Extension
Options:
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 7
Options:
A) SMTP
B) MIME
C) DNS
D) PPP
Options:
A) only touch devices with one hand so any electrical current will not flow through the heart
B) when setting up the network only use one bare hand-always wear a glove on at least one hand.
C) both "only touch devices with one hand so any electrical current will not flow through the
heart" & "when setting up the network only use one bare hand-always wear a glove on at least
one hand."
D) none of the options
Options:
A) 500 meters
B) 1000 meters
C) 2500 meters
D) 3000 meters
Options:
A) 123.255.255.255
B) 123.14.2555.255
C) 123.13.0.0
D) 123.1.1.1
Options:
A) 254
B) 255
C) 256
D) none of the options
Options:
A) 245
B) 26
C) 256
D) none of the options
Options:
A) 2
B) 4
C) 6
D) 8
Options:
A) to derive the host numbers so it knows where to sent the packet
B) to derive subnet mask and compare it with information in routing table
C) to derive which network and subnet to sent the packet to
D) none of the options
Options:
A) 1
B) 2
C) 3
D) none of the options
Options:
A) 1
B) 2
C) 4
D) none of the options
Options:
A) A. The applications that your network uses
B) A. Information in your security policy
C) How much traffic will pass through the firewall
D) Security audit measures in place
Options:
A) They are not suitable for short distance connections.
B) In multimode fibres, the transmitted light beam is 'bounced' off the cladding as it travels down
the core.
C) Data transmitted over fibre is susceptible for electromagnetic interferences.
D) Single mode fibres have not a higher bandwidth than multimode fibres.
Options:
A) Co-axial cable to A and wire-less link to B.
B) UTP cables to A and B.
C) UTP cable to A and fibre cable to B with media converters.
D) UTP cable to A and wire-less link to B.
Options:
A) Whenever a network node wishes to send a frame, it has to wait for the free token to arrive.
B) The IEEE 802.6 specifies the token ring MAC protocol.
C) After initialisation of a token ring network, a token can be transmitted in both directions of the
network.
D) A token ring with a shielded twisted pair transmission medium can have a minimum data rate
of 16Mbps.
Options:
A) Each character/byte is encapsulated within a start bit and a parity bit.
B) Each character/byte is encapsulated within a start bit and one or more stop bits.
C) No communication control characters are used.
D) Start bit is essential but the stop bit(s) is/are optional for each transmitted character/byte.
Options:
A) Statistical TDM can not makes efficient use of the bandwidth if the data stream is probabilistic.
B) TDM requires the transmitter and receiver to be synchronized periodically
C) TDM performs efficiently if the data stream is probabilistic.
D) Statistical TDM is efficient if the data stream is deterministic.
Options:
A) Cyclic Redundancy Check (CRC) code.
B) A Hamming code.
C) A RSA code.
D) A Huffman code.
Options:
A) Backward Error Correction (BEC).
B) Forward Error Correction (FEC).
C) Automatic Repeat Request (ARQ).
D) Huffman error correction technique.
Options:
A) ADSL has two different data rates, one for incoming and another for outgoing connections.
B) ADSL is a 64 Kbps leased line.
C) ADSL needs special cabling infrastructure.
D) The same domestic telephone connection can not be shared for normal telephony as well as
for ADSL.
Options:
A) Node.
B) Hub.
C) Router.
D) Cable.
Options:
A) Hub.
B) Access Router.
C) Graphic Accelerator Card.
D) Network Interface Card.
Options:
A) Is best for security and management.
B) Has all or part of the database copied at 2 or more computers.
C) Is dispersed among multiple computer systems.
D) Has problem of keeping all up to date data.
Options:
A) Contention among multiple processors attempting to access data simultaneously.
B) Slow response time.
C) High storage cost.
D) All processors loose access to data during disk failure.
Options:
A) Availability.
B) Performance.
C) Connectivity.
D) All of the options
Options:
A) A broadcast IP address.
B) A broadcast MAC address.
C) The default getaway IP address.
D) The default getaway MAC address.
Options:
A) 4
B) 2
C) 6
D) 3
Options:
A) network layer
B) data link layer
C) transport layer
D) session layer
Options:
A) Application layer
B) Physical layer
C) Session layer
D) Data link layer.
Options:
A) Bellman Ford Algorithm
B) Insertion Sort Algorithm
C) Dijkstra Algorithm
D) Kruskal Algorithm